Patent classifications
G06Q20/403
Methods and systems for verifying customer supplied financial account information using debit and credit transactions
Embodiment of the invention describe methods and systems for verifying customer supplied financial account information verification using debit and credit transactions. These methods include electronically transmitting an electronic debit and credit transaction to the customer financial account, based on the customer supplied financial account information. The method also includes electronically transmitting a first statement descriptor, as part of at least one of the electronic debit transaction and the electronic credit transaction, that includes a first verification code. The method also includes electronically receiving, from the customer, a second verification code, and comparing, by the computer system, the transmitted first verification code with the received second verification code with respect to each other. The method also includes verifying, by the computer system, the customer supplied financial account information based on the comparison of the verification codes.
BLOCKCHAIN BASED BANK CHECKING NETWORK
Systems and methods for providing blockchain based checks (BC Checks) that may be redeemed without traditional coordination between financial institutions of participants. Some particular embodiments of the present disclosure enable a recipient of a BC check (the payee) to validate the BC check directly through a blockchain hosted at least in part by the financial institution that issued the checks to the network participant using the BC check as payment (the payer) to the recipient. Some embodiments of the present disclosure further enable the payee to redeem the BC check for fiat currency directly through the payer's financial institution (even if the payee and payer do not share the same financial institution).
Cryptocurrency Protocol and System and Method for Use of Same
A cryptocurrency protocol and system and method for use of the same are disclosed. In one embodiment of the cryptocurrency protocol, a contingent financial transaction request is received. A blockchain addition mapping to a distributed accounting subledger of interest is performed to create contingent stored value. This blockchain addition mapping includes the contingent financial transaction request entered as an appended pair of contingent accounting entries including a corresponding debit entry and credit entry with validation detail data. If the appended pair of contingent accounting entries are validated, a blockchain addition mapping to a distributed accounting ledger of interest is performed to enter the contingency financial transaction request as an appended pair of accounting entries including the corresponding debit entry and credit entry.
SYSTEMS FOR ENHANCING FUNDING OF GAMING
Apparatus and methods are provided for facilitating the funding of gaming. Relative to a gaming table, a player may provide a commercial bank card to access funds via a table client. A request for funds from an account associated with the bank card is transmitted to a banking network. Upon approval, a monetary value voucher is generated, such as by a casino voucher system, and is printed and provided to the player at the gaming table. The player may redeem the voucher for funds, such as monetary value gaming chips for wagering at the gaming table.
Peer-to-peer prepaid card management system
A method for peer-to-peer prepaid card accounts can create a prepaid card that can receive donations through a QR code disposed on the physical card. Restrictions can also be placed on the card to control where or how the funds may be used. The method can, in response to receiving a request at a card management service to create an account, obtain account information, wherein the account information comprises a user name, an account number, a QR code image, and optionally a biometric data. The account information can be stored as a card account for the user, which is funded by receiving a payment from a second party using the QR code. Then, when a card holder uses the card for a transaction, the card management service can function as an issuer to authorize its use.
Method and system for providing risk information in connection with transaction processing
A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations.
Intelligent Management of Authorization Requests
Intelligent management of authorization requests are described. A server of a payment processing service can receive an authorization request to authorize a payment instrument for a predicted cost of a transaction between a first user and a second user. The server can compare the predicted cost of the transaction with an available balance of the payment instrument and determine that the available balance is less than the predicted cost of the transaction. Based on determining that the available balance is less than the predicted cost of the transaction, the server can determine that the payment instrument is not authorized for the predicted cost of the transaction and can authorize the transaction instead of declining the transaction based at least in part on a prediction of the actual cost of the transaction.
Method and System for Controlling Risk in a Payment Transaction
Example embodiments of the presently described subject matter are described that require a customer to use a secure payment token if, during a payment transaction, it is determined that the payment transaction poses a risk. A risk analysis may be performed based at least in part on data related to the payment transaction, such as data related to the customer, the transaction itself, the merchant, etc. If the results of the risk analysis indicate that an unacceptable amount of risk exists, the merchant or any interested party may require the customer to use a secure payment token, for example, a smart card, to conduct the transaction. Otherwise, the customer may proceed by using a static payment token, for example a credit card or PIN/password-based payment token.
AUTHENTICATION SYSTEM USING PAIRED, ROLE REVERSING PERSONAL DEVICES
An authentication system is provided for authenticating users in accordance with an encryption/decryption algorithm using first and second separately unique encryption keys that are time variable and are uniquely associated with each user, having a first user controlled computing device under the control of the user for generating said first encryption key using an encryption key generating algorithm. The first user controlled computing device includes a key transmitter for transmitting wirelessly within the immediate vicinity of the user the first encryption key, a second user controlled computing device, operating as a coordinating device under the control of the user, for generating the second encryption key using the encryption key generating algorithm. The second user controlled computing device includes a key receiver for receiving the first encryption key.
TRANSACTION DATA PROCESSING METHOD, DEVICE, APPARATUS AND SYSTEM
The present disclosure relates to the field of Internet technology. A transaction data processing method, a transaction data processing apparatus, a transaction data processing system, an electronic device, and a computer readable storage medium are provided. The method comprises: creating multiple data centers (301); with respect to at least two data centers in the multiple data centers, creating corresponding second-level accounts for a target payment institution respectively, wherein the second-level accounts support resource requirements of any third-level account corresponding to the target payment institution in the data centers (302); determining an available data center among the at least two data centers (303); and processing transaction data from the target payment institution by using a second-level account created for the target payment institution with respect to the available data center (304).